1.
Who is responsible for establishing access permissions to network resources in the DAC access control model?
2.
The Public Key Infrastructure (PKI) is a set of hardware, software, people, policies, and procedures needed to create, manage, store, distribute, and revoke digital certificates. The public key infrastructure is based on which encryption schemes?
3.
Why will a Faraday cage be used?
4.
The hashing algorithm is created from a hash value, making it nearly impossible to derive the original input number. Which item can implement the strongest hashing algorithm?
5.
For which reason are clocks used in Kerberos authentication?
6.
A travel reservation organization conducts the majority of its transactions via a public facing website. Any downtime to this website will lead to serious financial damage for this organization. One web server is connected to several distributed database servers. Which statement is correct about this scenario?
 
7.
Which of the following is a common type of attack on web servers?
8.
The employees at a company are using instant messaging on company networked computers. The MOST important security issue to address when using instant messaging is that instant messaging:
9.
Removable storage has been around almost as long as the computer itself. Which of the following is the GREATEST security risk regarding removable storage?
10.
In which authentication model a ticket granting server is an important concept?